Uploaded on Mar 22, 2023
Guide To Computer Disposal
Guide To Computer
Disposal
On Site Services
Whilst focus on the actual process of data destruction or sanitisation is key there are a whole host of
areas which require attention to ensure a safe, controlled environment for these services.
Business Credentials
When choosing a supplier for these critical IT Security Services the starting point should be an
assessment of the status of their business. This includes basic financial checks, verification of claims
for Certifications, levels of insurance and confirmation and verifying of published references.
Pre-collection Criteria
A robust process must begin with an exchange of information and documentation between us and the
Client that clearly identifies the number of assets for collection; how the assets are identified (e.g.
serial number); an agreed asset reconciliation process; sensitivity of data-bearing assets; confirmation
of service required; pre-collection agreements and service level agreements and transfer of custody (if
any) arrangements. Without this information, the chain of custody and service structure cannot be
initiated until equipment arrives on site.
Logistics
Risk of loss of assets during the transportation process is assessed both in terms of the probability of
physical loss or theft but also in control and management of the chain of custody. It is imperative that
equipment collected is controlled such that verification on receipt is confirmed and hence the risk of
potential losses during logistical transfer is mitigated.
External Site Security
All aspects of Concept Management’s site needs to be secured to deter either the casual opportunist
intruder or a determined planned attack. As such both physical and technology deterrents need to
provide overall site security.
Thank You
Website: https://berkshire-computer-recycling.co.uk/
Comments